IT Unit 11: Cybersecurity (A2 System vulnerabilities)

IT Unit 11: Cybersecurity (A2 System vulnerabilities)

12th Grade

10 Qs

quiz-placeholder

Similar activities

Net Plus Day 7

Net Plus Day 7

12th Grade - University

10 Qs

Sec 601 Section 5

Sec 601 Section 5

12th Grade

8 Qs

Threat Security+ Management Terms and Concepts Quizs

Threat Security+ Management Terms and Concepts Quizs

12th Grade

15 Qs

Technical Terms - Internet (A-Z) - Application Server

Technical Terms - Internet (A-Z) - Application Server

12th Grade

10 Qs

IT English Essentials: Unit 9 - Quiz 1

IT English Essentials: Unit 9 - Quiz 1

12th Grade

10 Qs

Lekturka Quiz 2-Full-timeIT

Lekturka Quiz 2-Full-timeIT

9th - 12th Grade

14 Qs

M4 L2: Introduction to PAP, CHAP and MS-CHAP

M4 L2: Introduction to PAP, CHAP and MS-CHAP

12th Grade

9 Qs

CCST Managing Networks Chapter 21

CCST Managing Networks Chapter 21

9th - 12th Grade

12 Qs

IT Unit 11: Cybersecurity (A2 System vulnerabilities)

IT Unit 11: Cybersecurity (A2 System vulnerabilities)

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Ralph Ellis

Used 44+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Potential source(s) of network vulnerabilities

Network ports

USB drives

Poorly managed file permissions and privileges

Failing to enforce a password policy

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Port number used for HTTP?

80

443

418

27

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Examples of organisational vulnerabilities

Network ports

USB drives

Poorly managed file permissions and privileges

Failing to enforce a password policy

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Examples of software vulnerabilities

Downloading software from untrustworthy sources

SQL injection

Zero-day vulnerabilities

Failing to enforce a password policy

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Continuing to use an older operating system, well after it is no longer being supported by the developer is an example of which type of vulnerability?

Operating system vulnerability

Software vulnerability

Network vulnerability

Organisational vulnerability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The largest vulnerability for mobile devices...

The time it takes for the original equipment manufacturer (OEM) to update that system software

Hackers accessing the mobile network signal.

Failure to support CSMA with RTS/CTS

Users' inability to secure their own deceives with passcodes.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Examples of physical vulnerabilities

Downloading software from untrustworthy sources

Theft of equipment

Social engineering

Failing to enforce a password policy

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?